Book Image

Microsoft Azure Security

Book Image

Microsoft Azure Security

Overview of this book

Table of Contents (12 chapters)

Chapter 5. Identity and Access Management for Developers

In Chapter 2, Identity and Access Management for Users, we understand the basics of the IAM options for Azure users. This is very important, since our work to implement a fine grained security in each Azure Service can be easily frustrated by a weak administrative authentication mechanism. This is why we talked about the various security options of a Microsoft account, along with the use of Azure AD users to authenticate against Azure itself.

However, Azure AD is a growing IAM service itself with great integration options for custom applications. In Chapter 3, Platform as a Service and Chapter 4, Infrastructure as a Service we talked about security while using PaaS and IaaS services, respectively. This chapter covers the following:

  • Azure AD and ACS

  • Azure Key Vault

These two services help developers to build the security aspects of an application. The first, from the developers' perspective, is an IAM service, useful to plug an authentication...